CCSK in the Wild: Survey of 2018 Certificate Holders

CCSK in the Wild: Survey of 2018 Certificate Holders

Even as more organizations migrate to the cloud, there’s still a concern as to how well those cloud services are being secured. According to an article by Forbes “66% of IT professionals say security is their greatest concern in adopting a cloud computing strategy.” As you embark on your quest to fill this skills gap, you may [...]

Why the CISO matters

Why the CISO matters

The chief information security officer role hasn’t always gotten the respect it deserves. Research over the years has shown companies often treat their CISO primarily as a scapegoat for security incidents. But that may be changing – at least it is in organizations with a strong cybersecurity culture. New research by (ISC)2 shows the overwhelming majority of [...]

Shedding Light on the Dark Web

Shedding Light on the Dark Web

The Dark Web is the part of the internet that is inaccessible by conventional search engines and requires special anonymizing software to access. In colloquial terms, these are the darkest corners of the internet, where a widespan of nefarious activity takes place, as highlighted in the graphic below. The Dark Web raises many questions, even [...]

CVE and Cloud Services, Part 2: Impacts on Cloud Vulnerability and Risk Management

CVE and Cloud Services, Part 2: Impacts on Cloud Vulnerability and Risk Management

This is the second post in a series, where we’ll discuss cloud service vulnerability and risk management trends in relation to the Common Vulnerability and Exposures (CVE) system. In the first blog post, we wrote about the Inclusion Rule 3 (INC3) and how it affects the counting of cloud service vulnerabilities. Here, we will delve deeper [...]